Skip to main content

US defense contractors’ networks breached by hackers

hackers-lockheed-martin
Image used with permission by copyright holder

Hackers have allegedly broken into the systems of some of the most prominent defense contractors, including Lockheed Martin Corp and other companies that develop weapon systems for the US Department of Defense, reports Reuters, who spoke with a person familiar with the matter.

To breach the systems, hackers reportedly duplicated electronic login keys known as “SecurID,” which are made by the EMC corporation’s RSA security division. It is not yet known if any data was stolen by the hackers. But because of the highly sensitive nature of the information stored on Lockheed’s and other’s systems — data about classified future weapon systems being built for the US military, as well as weapons currently in us in Iraq and Afghanistan — it’s not difficult to assume what kind of info the hackers were after.

Widely used to protect sensitive data, SecurIDs are far more robust than a standard username/password combo that one would use to login to, say, Facebook. Instead, SecurID generates a new series of digits every couple of minutes that the user must enter into the system, along with a unique user pin. Failure to login before the next set of numbers is generated results in denied access to the system.

The breach, said to have been carried out in March, actually involved more than one attack. First came the initial breach on the RSA division, during which hackers stole data the taught them how to copy the security keys. Then came a wave of malware and phishing attacks launched to gain additional user and network data that would allow for greater access to the systems. This type of attack is known as an “Advanced Persistent Threat” or APT.

In addition to an internal investigation into the matter, EMC says it took immediate steps to protect its customers, which included “hardening our IT infrastructure.”

Rich Moy, president of information security firm NSS Labs, tells Reuters that the nature of the attack means a threat remains.

“Given the military targets, and that millions of compromised keys are in circulation, this is not over.”

Editors' Recommendations

Topics
Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
How to delete your Gmail account (and what you need to know)
The top corner of Gmail on a laptop screen.

Is it time to part ways with your Gmail account? Whether you’re moving onto greener email pastures, or you want to start fresh with a new Gmail address, deleting your old Gmail account is something anyone can do. Of course, we’re not just going to bid you farewell without a guide all our own. If you need to delete your Gmail account, we hope these step-by-step instructions will make the process even easier.

Read more
How to alphabetize data in an Excel spreadsheet
A Microsoft Excel icon in the dock on a Macbook.

Manually organizing data in Microsoft Excel is a real pain. That's why we don't recommend doing it. One simple task, learning how to alphabetize in Excel, is not necessarily as intuitive as we would like. Here's how to get things sorted in a logical, alphabetical order.

Read more
How to build a table of contents in Microsoft Word
Microsoft word document.

Navigating through a Microsoft Word document can be a tedious task for some. Assignments and contracts can lead to many pages that can be hard to keep track of. One solution Microsoft offers for this is a table of contents. In addition to providing an outline and general overview of the content, the feature gives the document a more professional look.

Here’s a guide on how to create a table of contents in Microsoft Word.

Read more